3 %bcond_without selinux # build without SELinux support
5 Summary: Allows command execution as root for specified users
6 Summary(es): Permite que usuarios específicos ejecuten comandos como se fueran el root
7 Summary(ja): »ØÄê¥æ¡¼¥¶¤ËÀ©¸ÂÉÕ¤Îroot¸¢¸Â¤òµö²Ä¤¹¤ë
8 Summary(pl): Umo¿liwia wykonywanie poleceñ jako root dla konkretnych u¿ytkowników
9 Summary(pt_BR): Permite que usuários específicos executem comandos como se fossem o root
10 Summary(ru): ðÏÚ×ÏÌÑÅÔ ÏÐÒÅÄÅÌÅÎÎÙÍ ÐÏÌØÚÏ×ÁÔÅÌÑÍ ÉÓÐÏÌÎÑÔØ ËÏÍÁÎÄÙ ÏÔ ÉÍÅÎÉ root
11 Summary(uk): äÏÚ×ÏÌѤ ×ËÁÚÁÎÉÍ ËÏÒÉÓÔÕ×ÁÞÁÍ ×ÉËÏÎÕ×ÁÔÉ ËÏÍÁÎÄÉ ×¦Ä ¦ÍÅΦ root
17 Group: Applications/System
18 Source0: ftp://ftp.courtesan.com/pub/sudo/%{name}-%{version}.tar.gz
19 # Source0-md5: 6d0346abd16914956bc7ea4f17fc85fb
21 Source2: %{name}.logrotate
22 Patch0: %{name}-selinux.patch
23 Patch1: %{name}-ac.patch
24 URL: http://www.courtesan.com/sudo/
25 BuildRequires: autoconf >= 2.53
26 BuildRequires: automake
27 %{?with_selinux:BuildRequires: libselinux-devel}
28 BuildRequires: heimdal-devel >= 0.7
29 BuildRequires: openldap-devel
30 BuildRequires: skey-devel >= 2.2-11
31 BuildRequires: libtool
32 BuildRequires: pam-devel
33 Requires: pam >= 0.77.3
35 BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
38 Sudo (superuser do) allows a permitted user to execute a command as
39 the superuser (real and effective uid and gid are set to 0 and root's
40 group as set in the passwd file respectively).
42 Sudo determines who is an authorized user by consulting the file
43 /etc/sudoers. By giving sudo the -v flag a user can update the time
44 stamp without running a command. The password prompt itself will also
45 time out if the password is not entered with N minutes (again, this is
46 defined at installation time and defaults to 5 minutes).
49 Sudo (superuser do) permite que el administrador del sistema otorga a
50 ciertos usuarios (o grupos de usuarios) la habilidad para ejecutar
51 algunos (o todos) comandos como root, registrando todos los comandos y
52 argumentos. Sudo opera en una base por comando, no siendo un
53 substituto para la shell.
57 ¤È¤Ï¥·¥¹¥Æ¥à´ÉÍý¼Ô¤¬¡¢¿®ÍѤǤ¤ë¥æ¡¼¥¶(¤Þ¤¿¤Ï¥°¥ë¡¼¥×)¤ËÂÐ
58 ¤·¤Æ¡¢¤¤¤¯¤Ä¤«(¤â¤·¤¯¤ÏÁ´¤Æ)¤Î¥³¥Þ¥ó¥É¤ò root
59 ¤È¤·¤Æ¼Â¹Ô¤Ç¤¤ë¤è¤¦¡¢¤½¤Î¥³¥Þ¥ó
60 ¥É¤Î¼Â¹ÔÍúÎò¤Î¥í¥°¤ò¤È¤ê¤Ä¤Äµö²Ä¤¹¤ë»ÅÁȤߤǤ¹¡£sudo
61 ¤Ï¥³¥Þ¥ó¥É°ì¹Ôñ°Ì¤ÇÆ°ºî
62 ¤·¤Þ¤¹¡£¥·¥§¥ë¤ÎÃÖ¤´¹¤¨¤Ç¤Ï¤¢¤ê¤Þ¤»¤ó¡£°Ê²¼¤Îµ¡Ç½¤òÆ⢤·¤Æ¤¤¤Þ¤¹¡£¥Û¥¹¥Èñ°Ì
63 ¤Ç¡¢¤½¤Î¥³¥Þ¥ó¥É¤ò¼Â¹Ô²Äǽ¤Ê¥æ¡¼¥¶¤òÀ©¸Â¤¹¤ëµ¡Ç½¡¢³Æ¥³¥Þ¥ó¥É¤Ë¤Ä¤¤¤Æ¤Î(郎¤Ê
64 ¤Ë¤ò¼Â¹Ô¤·¤¿¤«¤Îº¯Àפò»Ä¤¹¤¿¤á¤Î)ËÉÙ¤Ê¥í¥®¥ó¥°µ¡Ç½¡¢sudo
66 ¥È»þ´Ö¤òÀßÄê²Äǽ¡¢Ê£¿ô¤Î¥Þ¥·¥ó¤ÇƱ°ì¤ÎÀßÄê¥Õ¥¡¥¤¥ë(sudoers)¤ò¶¦Í¤¹¤ëµ¡Ç½¡¢¤¬
70 Sudo (superuser do) umo¿liwia wykonywanie konkretnych poleceñ jako
71 root dla wyspecyfikowanych u¿ytkowników (rzeczywiste i efektywne
72 uid/gid podczas wykonywania tych programów jest 0). To kto mo¿e
73 wykonywaæ konkretne polecenia i w jaki sposób ma byæ autoryzowany jest
74 opisane w pliku /etc/sudoers.
77 Sudo (superuser do) permite que o administrador do sistema dê a certos
78 usuários (ou grupos de usuários) a habilidade para rodar alguns (ou
79 todos) comandos como root, registrando todos os comandos e argumentos.
80 Sudo opera numa base por comando, não sendo um substituto para a
84 Sudo (superuser do) ÐÏÚ×ÏÌÑÅÔ ÓÉÓÔÅÍÎÏÍÕ ÁÄÍÉÎÉÓÔÒÁÔÏÒÕ ÐÒÅÄÏÓÔÁ×ÌÑÔØ
85 ÏÐÒÅÄÅÌÅÎÎÙÍ ÐÏÌØÚÏ×ÁÔÅÌÑÍ (ÉÌÉ ÉÈ ÇÒÕÐÐÁÍ) ×ÏÚÍÏÖÎÏÓÔØ ÉÓÐÏÌÎÑÔØ
86 ÎÅËÏÔÏÒÙÅ (ÉÌÉ ×ÓÅ) ËÏÍÁÎÄÙ Ó ÐÒÁ×ÁÍÉ root, ÐÒÉ ÜÔÏÍ ÐÒÏÔÏËÏÌÉÒÕÑ ×ÓÅ
87 ËÏÍÁÎÄÙ É ÁÒÇÕÍÅÎÔÙ. Sudo ÒÁÂÏÔÁÅÔ Ó ÏÔÄÅÌØÎÙÍÉ ËÏÍÁÎÄÁÍÉ, ÜÔÏ ÎÅ
88 ÚÁÍÅÎÁ ËÏÍÁÎÄÎÏÊ ÏÂÏÌÏÞËÉ (shell). îÅËÏÔÏÒÙÅ ÉÚ ×ÏÚÍÏÖÎÏÓÔÅÊ sudo:
89 ÏÇÒÁÎÉÞÅÎÉÅ ÔÏÇÏ, ËÁËÉÅ ËÏÍÁÎÄÙ ÐÏÌØÚÏ×ÁÔÅÌØ ÍÏÖÅÔ ÚÁÐÕÓËÁÔØ ×
90 ÚÁ×ÉÓÉÍÏÓÔÉ ÏÔ ÈÏÓÔÁ; ÐÏÌÎÏÅ ÐÒÏÔÏËÏÌÉÒÏ×ÁÎÉÅ ËÁÖÄÏÊ ËÏÍÁÎÄÙ;
91 ÎÁÓÔÒÁÉ×ÁÅÍÏÅ ×ÒÅÍÑ, ÎÁ ÐÒÏÔÑÖÅÎÉÉ ËÏÔÏÒÏÇÏ sudo ÐÏÍÎÉÔ ÐÁÒÏÌØ;
92 ÉÓÐÏÌØÚÏ×ÁÎÉÅ ÏÄÎÏÇÏ ËÏÎÆÉÇÕÒÁÃÉÏÎÎÏÇÏ ÆÁÊÌÁ (sudoers) ÎÁ ÍÎÏÇÉÈ
96 Sudo (superuser do) ÄÏÚ×ÏÌѤ ÓÉÓÔÅÍÎÏÍÕ ÁÄͦΦÓÔÒÁÔÏÒÏצ ÎÁÄÁÔÉ ÐÅ×ÎÉÍ
97 ËÏÒÉÓÔÕ×ÁÞÁÍ (ÞÉ §È ÇÒÕÐÁÍ) ÍÏÖÌÉצÓÔØ ×ÉËÏÎÕ×ÁÔÉ ÄÅÑ˦ (ÞÉ ×Ó¦)
98 ËÏÍÁÎÄÉ Ú ÐÒÁ×ÁÍÉ root, ÐÒÉ ÃØÏÍÕ ÐÒÏÔÏËÏÌÀÀÞÉ ×Ó¦ ËÏÍÁÎÄÉ ÔÁ
99 ÁÒÇÕÍÅÎÔÉ. Sudo ÐÒÁÃÀ¤ Ú ÏËÒÅÍÉÍÉ ËÏÍÁÎÄÁÍÉ, ÃÅ ÎÅ ÚÁͦÎÁ ËÏÍÁÎÄÎϧ
100 ÏÂÏÌÏÎËÉ (shell). äÅÑ˦ Ú ÍÏÖÌÉ×ÏÓÔÅÊ sudo: ÏÂÍÅÖÅÎÎÑ ÔÏÇÏ, Ñ˦
101 ËÏÍÁÎÄÉ ËÏÒÉÓÔÕ×ÁÞ ÍÏÖÅ ÚÁÐÕÓËÁÔÉ × ÚÁÌÅÖÎÏÓÔ¦ ×¦Ä ÈÏÓÔÁ; ÐÏ×ÎÅ
102 ÐÒÏÔÏËÏÌÀ×ÁÎÎÑ ËÏÖÎϧ ËÏÍÁÎÄÉ; ÎÁÓÔÒÏÀ×ÁÎÉÊ ÞÁÓ, ÎÁ ÐÒÏÔÑÚ¦ ÑËÏÇÏ sudo
103 ÐÁÍ'ÑÔÁ¤ ÐÁÒÏÌØ; ×ÉËÏÒÉÓÔÁÎÎÑ ÏÄÎÏÇÏ ËÏÎƦÇÕÒÁæÊÎÏÇÏ ÆÁÊÌÕ (sudoers)
108 %{?with_selinux:%patch0 -p1}
111 mv -f aclocal.m4 acinclude.m4
112 # kill libtool.m4 copy
118 cp -f /usr/share/automake/config.sub .
122 # sparc64 2.4.x kernels have buggy sys32_utimes(somefile, NULL) syscall
123 # it's fixed in >= 2.4.31-0.3, but keep workaround not to require very
125 %ifarch sparc sparcv9
126 export ac_cv_func_utimes=no
130 --with-incpath=/usr/include/security \
131 --with-timedir=/var/run/sudo \
133 --with-logging=both \
135 --with-logpath=/var/log/sudo \
138 --with-secure-path="/bin:/sbin:/usr/bin:/usr/sbin" \
140 --disable-saved-ids \
144 --with-long-otp-prompt
149 rm -rf $RPM_BUILD_ROOT
150 install -d $RPM_BUILD_ROOT{%{_sysconfdir}/{pam.d,logrotate.d},/var/{log,run/sudo}}
153 DESTDIR=$RPM_BUILD_ROOT \
154 install_uid=`id -u` \
155 install_gid=`id -g` \
156 sudoers_uid=`id -u` \
159 install %{SOURCE1} $RPM_BUILD_ROOT/etc/pam.d/sudo
160 touch $RPM_BUILD_ROOT/var/log/sudo
161 install %{SOURCE2} $RPM_BUILD_ROOT/etc/logrotate.d/sudo
163 chmod -R +r $RPM_BUILD_ROOT%{_prefix}
165 rm -f $RPM_BUILD_ROOT%{_libdir}/sudo_noexec.la
168 rm -rf $RPM_BUILD_ROOT
171 %defattr(644,root,root,755)
172 %doc BUGS CHANGES HISTORY README TODO TROUBLESHOOTING sample.sudoers
173 %attr(440,root,root) %verify(not md5 size mtime) %config(noreplace) %{_sysconfdir}/sudoers
174 %attr(600,root,root) %config(noreplace) %verify(not size mtime md5) /etc/pam.d/sudo
175 %attr(4755,root,root) %{_bindir}/sudo
176 %attr(4755,root,root) %{_bindir}/sudoedit
177 %{?with_selinux:%attr(755,root,root) %{_sbindir}/sesh}
178 %attr(755,root,root) %{_sbindir}/visudo
179 %attr(755,root,root) %{_libdir}/sudo_noexec.so
181 %attr(600,root,root) %ghost /var/log/sudo
182 %attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/logrotate.d/*
183 %attr(700,root,root) %dir /var/run/sudo